Lenker
Postadresse
Institutt for datateknikk og informasjonsvitenskap
Norges teknisk-naturvitenskapelige universitet
7491 Trondheim
Kort biografi Maks 160 tegn [0/160]
Lang biografi
Vitenskaplig, faglig og kunstnerisk arbeid
Et utvalg av nyere tidsskriftspublikasjoner, kunstneriske produksjoner, bok, inklusiv bokdeler og rapport-del.
Tidsskriftspublikasjoner
- (2013) HARM: Hacker Attack Representation Method. Communications in Computer and Information Science. 2013; volum 170.
- (2012) Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks. International Journal of Secure Software Engineering. 2012; volum 3 (2).
- (2012) Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. Lecture Notes in Computer Science. 2012; volum 7195.
- (2012) Managing Implicit Requirements Using Semantic Case-Based Reasoning. Research Preview. Lecture Notes in Computer Science. 2012; volum 7195.
- (2012) Ontology-Based Support for Security Requirements Specification Process. Lecture Notes in Computer Science. 2012; volum 7567.
- (2012) Evaluating a Taxonomy for Mobility Requirements by a Controlled Experiment. ISRN Software Engineering. 2012; volum 2012.
- (2012) Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation. International Journal of Information System Modeling and Design. 2012; volum 3 (3).
- (2012) Boilerplates for Application Interoperability Requirements. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi. 2012
- (2012) Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases. Lecture Notes in Business Information Processing. 2012; volum 113.
- (2011) Adapted UML Activity Diagrams for Mobile Work Processes: Experimental comparison of colour and pattern fills. Lecture Notes in Business Information Processing. 2011; volum 81.
- (2011) Extending Use and Misuse Case Diagrams to Capture Multi-channel Information Systems. Communications in Computer and Information Science. 2011; volum 251.
- (2011) Extending Use and Misuse Cases to Capture Mobile Applications. NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi. 2011
- (2011) Diagram Notations for Mobile Work Processes. Lecture Notes in Business Information Processing. 2011; volum 92.
- (2011) Empirical Study on Quality Requirements of Migration Metadata. Communications in Computer and Information Science. 2011; volum 253 (5).
- (2011) Exploring a Bayesian and linear approach to requirements traceability. Information and Software Technology. 2011; volum 53 (8).
- (2011) A Double-Cross Policy Against Social Engineers. NIK: Norsk Informatikkonferanse. 2011
- (2010) Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives. Lecture Notes in Business Information Processing. 2010; volum 68.
- (2010) A study on Mobile Requirements Elicitation by Boilerplate Requirements Specification Language. Proceedings of the International Conference on Electronic Business. 2010
- (2010) Visualizing Cyber Attacks with Misuse Case Maps. Lecture Notes in Computer Science. 2010; volum 6182.
- (2010) Comparing two techniques for intrusion visualization. Lecture Notes in Business Information Processing. 2010; volum 68.